Who Is A Privileged User, Really? You May Be Surprised by the Answer

Allowing employees to use their own devices, and consequently moving enterprise assets to the cloud, can certainly improve productivity, but also puts the organization at risk for additional security threats. According to Gartner, more than 50% of organizations are unable to extend incumbent authentication methods to safely enable access for an increasingly mobile workforce.

The way forward? Start by understanding that the IT Team is not your only high security risk. Organizations need ID assurance for every person and every system that puts the enterprise at risk. Until now, achieving this was too complex.

Enterprises can now cost-effectively and easily extend their current authentication solutions. This all starts with accurately establishing the appropriate privilege level by identifying and defining who or what is actually “privileged”, based on access to sensitive information or privileged data. In this webinar, Yubico and Axiad IDS will discuss:

- Why identifying privileged users is at the root of data breach prevention and what it takes to extend strong authentication across the enterprise
- How enterprises can securely and efficiently manage the lifecycle of their devices and credentials, while saving on deployment and IT operational costs
- The key benefits of enabling hardware-backed two-factor authentication to address the demands of an expanding digital workplace

Security breaches are a growing industry wide problem that in 2018 cost companies an average of $3.8 million per breach. Software storage of cryptographic keys for servers is increasingly vulnerable as attacks become more sophisticated.

Traditionally, organizations have used Hardware Security Modules (HSMs) that were costly and complex to set up. However, with the YubiHSM 2, organizations of all sizes can enable effective security for cryptographic keys, across the entire lifecycle, in a portable and affordable hardware form factor. And with the new open source SDK, developers can build in hardware based strong security for cryptographic keys across a wider range of platforms and services than ever before.

Cyber attackers are becoming more sophisticated and data breaches are on the rise. According to a recent report, over 4.6 billion records were breached in the first half of 2018, showing a 133% increase compared to last year.

With sensitive, personal and confidential data being at risk of ending up in the hands of cyber criminals, enterprises of all sizes are looking to strengthen their security in 2019.

Join this exclusive keynote panel of industry experts as they discuss:
- Trends in cyber attacks and breaches
- Who is at risk
- How to prevent breaches, data theft and future cyber crime
- Advances in authentication
- New in identity and access management
- Security awareness and training
- Best practices for securing the enterprise

Allowing employees to use their own devices, and consequently moving enterprise assets to the cloud, can certainly improve productivity, but also puts the organization at risk for additional security threats. According to Gartner, more than 50% of organizations are unable to extend incumbent authentication methods to safely enable access for an increasingly mobile workforce.

The way forward? Start by understanding that the IT Team is not your only high security risk. Organizations need ID assurance for every person and every system that puts the enterprise at risk. Until now, achieving this was too complex.

Enterprises can now cost-effectively and easily extend their current authentication solutions. This all starts with accurately establishing the appropriate privilege level by identifying and defining who or what is actually “privileged”, based on access to sensitive information or privileged data. In this webinar, Yubico and Axiad IDS will discuss:

- Why identifying privileged users is at the root of data breach prevention and what it takes to extend strong authentication across the enterprise
- How enterprises can securely and efficiently manage the lifecycle of their devices and credentials, while saving on deployment and IT operational costs
- The key benefits of enabling hardware-backed two-factor authentication to address the demands of an expanding digital workplace

Join us for a session on the new YubiKey 5 Series and learn about the new features and benefits of our latest product line. We'll cover the difference between the YubiKey 5 Series with the YubiKey 4 Series and YubiKey NEO, as well as introduce the use cases and concepts of going passwordless.

Watch this webinar to learn what FIDO2 Authentication is, and how to architect FIDO2 Authentication within applications. This session is led by Derek Hanson, Yubico Senior Director of Solutions Architecture and Standards.

You solve security challenges in the realm of authentication and identity—and now the new buzz word “blockchain” is popping up everywhere. Join Yubico founder Stina Ehrensvard and a16zcrypto Partner Ali Yahya for a session on blockchain and authentication technologies. We’ll help you make sense of these technologies, and how they fit together in the security and identity management landscape.

Watch this webinar to learn what FIDO2 Authentication is, and how to architect FIDO2 Authentication within applications. This session is led by Derek Hanson, Yubico Senior Director of Solutions Architecture and Standards.

The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).

As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.

One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.

In this webinar, Yubico and Ping Identity will discuss:
● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement

The connection between cybersecurity and a company’s bottom line is increasingly becoming clear to all stakeholders in an organization, not the least of which is the boardroom. Cybersecurity has quickly risen in importance as an agenda item in most boardroom planning discussions and is now perceived and treated as a critical and strategic consideration.

The key risks mapped to cybersecurity fears range from brand damage, breach costs, and loss of competitive advantage through corporate espionage. Join this webinar to cut through the noise and uncover the #1 cybersecurity risk board members should take action on that will have the biggest impact on their organization.

Uber recently disclosed a massive data breach in which the personal information of 57 million Uber customers and drivers were stolen by hackers in October 2016. What are some of the lessons we can draw from this latest breach?

Join this interactive panel of experts as they review:
- What is the impact of this breach?
- What should Uber users do in response to this breach?
- What are the most common reasons for breaches?
- What should organizations be doing to better tighten their security?

The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.

An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).

Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:

•How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
•How to leverage open standards to achieve GDPR compliance for strong authentication
•How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks

The 2017 Verizon Data Breach Report found that 81% of hacking-related breaches leveraged stolen and/or weak passwords last year. Organizations looking for strong authentication solutions often face a trade-off between security and simplicity.

Smart card and FIDO Universal 2nd Factor (U2F) are two of the strongest authentication solutions for protecting your entire organization, and securing the information they access. Employees, vendors, partners, and customers all need strong authentication for workstation login, access to web applications, remote access to services, and privileged system access. During this webinar, Yubico’s VP of Solutions Jerrod Chong will share:

Nine of the top 10 tech companies, including Google, Facebook, and Salesforce.com, use Yubico’s authentication solutions to protect all of their employees from phishing, man-in-the-middle, and malware attacks. Yubico’s enterprise-wide solution, the YubiKey, combines both smart card and FIDO U2F capabilities in a single hardware-based authentication device.

GOV.UK Verify is a new simple way for UK citizens to access an increasing range of UK government services online. This is the first government service in the world to make support for the new open authentication standard FIDO U2F.

UK citizens can easily purchase a FIDO U2F authenticator online and register it with Digidentity, one of the UK government’s certified identity service providers. Yubico’s durable FIDO U2F-certified YubiKeys work with a single touch, and need no drivers or client software. YubiKeys are used by millions of people in over 160 countries.

FIDO Universal 2nd Factor (U2F) is an open authentication standard that enables internet users to securely access any number of online services, with one single YubiKey device, instantly and with no drivers or client software needed.

U2F leverages public key cryptography, protecting against modern hacker techniques used in the current breach-filled world. Major online services -- such as GitHub, Google, and Dropbox -- are leading the way to protect their employees and global users with U2F.

This technical webinar provides an introduction to concepts on how to implement U2F, including code examples using Python.

As a Salesforce admin, you can allow your users to authenticate with a YubiKey any time they’re challenged to verify their identity. Once provisioned, users simply insert and tap their YubiKey to complete verification. It’s a secure, convenient alternative to using Salesforce Authenticator or one-time passwords sent by email or SMS.

In this on-demand webinar, Itzik Koren (Salesforce) and Jerrod Chong (Yubico) demonstrate why it is important to activate U2F with single sign-on (SSO) on Salesforce.com, and the cost savings you can achieve with YubiKey as a hardware-based second factor.

In this webinar, we’ll show you real-life examples of the ways Yubico and Centrify provide context-based, adaptive authentication across enterprise users and resources. Across a wide range of use cases, Centrify and Yubico provide IT the flexibility to enforce security without user frustration.

Centrify Identity Service can leverage the easy-to-use, multi-function YubiKey for use cases such as:

Yubico was founded in Sweden 2007 with the mission to make secure login easy and available for everyone. In 2011, Yubico’s founders moved to Silicon Valley to make that dream happen. In close collaboration with the leading internet companies and thought leaders we created native support for our security keys in major online platforms and browsers, enabling a safer internet for billions of people. Yubico is a core contributor to the WebAuthn and CTAP protocols, and the specification is hosted by the FIDO Alliance.